NEW QUESTION 278
Drag and Drop
You are developing an ASP.NET Software-as-a-Service (SaaS) application that stores database credentials in Azure Key Vault. When the application encounters an error, information about the error is shown to the end user for support purposes. Information shown includes:
– stack trace
– application version and release date
– configuration values
Database credentials must not be accessible to end users. You need to ensure that end users cannot view database credentials. Which three actions should you perform in sequence?
……

NEW QUESTION 170A service provider experiences routing issues in a customer MPLS network. The customer has two sites that are connected over its core. Which feature can be used for troubleshooting?

A. Disabling of Cisco Express Forwarding, to enable the use of LSP Ping and LSP Traceroute to verify the IP routing path.B. Redistribution between the BGP IPv4 and VPNv4 address families, to use labels to forward the customer packets.C. LSP Ping, to confirm that the label-switched path is used for transport.D. Traceroute, to verify the label-switched path that is used for point-to-multipoint.

A. The default channel is allocated and the backup set is created in only one destination.B. Two channels are allocated and backup pieces for the backup set are created in both the specified destinations.C. Two channels are allocated and two copies of the backup set are taken in parallel in both locations.D. Two channels are allocated and a copy of the backup set is taken in the location specified by CHANNEL 2.

NEW QUESTION 261You work for a company that uses customized applications. The applications are published to 150 Windows 10 Enterprise laptops that are deployed in the field. All users must use the same version of the applications at the same time. You need to deploy and manage the applications updates centrally. What should you do?

A. Deploy the applications as a Microsoft Application Virtualization.B. Use System Center Configuration Manager to deploy the application updates to the client.C. Deploy application updates as a shim through System Center Configuration.D. Use Intune to deploy the applications with the appropriate settings through the Windows Store.

NEW QUESTION 261Two Cisco Unified Communications Manager clusters have recently been installed. One is in Tokyo and the other in Chicago connected by a WAN link. You have started the configuration of a SIP trunk and you are integrating the dial plans. All phones in Tokyo can call all phones in Chicago, but no phones in Chicago can call Tokyo phones. Which two statements are possible causes? (Choose two.)

A. The CSS of the Chicago phones does not include the partition of the route pattern to point to Tokyo.B. The SIP trunk in Chicago is in a CSS that is not in the partition of the Chicago phones.C. The Tokyo SIP trunk inbound CSS does not contain the partition of the Tokyo phones.D. Tokyo phones are in a CSS that is not in the partition of the route pattern to call from Tokyo to Chicago.E. The SIP trunk is configured from Tokyo to Chicago, but not from Chicago to Tokyo.

NEW QUESTION 235A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?